HYPR launches Enterprise Passkeys for Microsoft Azure
HYPR announced its newest offering, Enterprise Passkeys for Microsoft Azure and integrated with Microsoft Entra. This new technology turns any smartphone into a FIDO2 virtual…
HYPR announced its newest offering, Enterprise Passkeys for Microsoft Azure and integrated with Microsoft Entra. This new technology turns any smartphone into a FIDO2 virtual…
The developers of first-person shooter game, STALKER 2, have revealed assets related to the game were stolen and used for blackmail and intimidation. Ukrainian game…
Adam Bannister 09 February 2021 at 12:47 UTC Updated: 09 February 2021 at 12:59 UTC ‘An odd one, impact wise’ A vulnerability in a Docker…
Crypto trading might be a successful method to gain money, but it is not without risks. A trader must understand how to handle these risks…
Two European privacy watchdogs have won cases against Meta. The rulings may have serious consequences for European website owners. The Amsterdam court has ruled that…
AMF parsing and XXE I recently played with two libraries parsing the AMF (aka Action Message Format) binary format: BlazeDS and PyAMF. Both libraries were…
A decryption tool for a modified version of the Conti ransomware could help hundreds of victims recover their files for free. The utility works with…
According to a joint advisory from the US CISA (Cybersecurity and Infrastructure Security Agency), the FBI (Federal Bureau of Investigation), and MS-ISAC (Multi-State Information Sharing…
Emotet finally got the memo and added Microsoft OneNote lures. Last week, Emotet returned after a three month absence when the botnet Epoch 4 started sending…
In 2022, the Wallarm Threat Research team went through almost 350,000 reports to find 650 API-specific vulnerabilities, and tracked 115 published exploits impacting these vulnerabilities…
A suspected Chinese hacking group has been linked to a series of attacks on government organizations exploiting a Fortinet zero-day vulnerability (CVE-2022-41328) to deploy malware.…
A new decryption tool that aids victims of a ransomware version that was based on previously released Conti source code has been published. Ransomware gangs like…